12 research outputs found

    Comparing the Effects of Distilled Rehmannia glutinosa, Wild Ginseng and Astragali Radix Pharmacopuncture With Heart Rate Variability (HRV): A Randomized, Sham-controlled and Double-blind Clinical Trial

    Get PDF
    AbstractThis study compared the effects of distilled Rehmannia glutinosa, Wild Ginseng and Astragali Radix pharmacopuncture on the autonomic nervous system and heart rate variability. The purpose of the trial was to observe the influence distilled Astragali Radix, Wild Ginseng and Rehmannia glutinosa pharmacopuncture have on the autonomic nervous system. 120 healthy male volunteers were divided into four groups, which consisted of three experimental groups and a control group. This study was a randomized, placebo-controlled, double-blind clinical trial. Volunteers in experimental groups were underwent pharmacopuncture at GB21 (Kyonjong), and volunteers in the control group were injected with normal saline at GB21 (Kyonjong). Heart rate variability was measured seven times: before and after injection, every 5 minutes for 30 minutes. The result was distilled Rehmannia glutinosa, Wild Ginseng and Astragali Radix pharmacopuncture in healthy adult males tended to activate the autonomic nervous system, particularly the sympathetic nervous system

    Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet

    No full text
    The darknet (i.e., a set of unused IP addresses) is a very useful solution for observing the global trends of cyber threats and analyzing attack activities on the Internet. Since the darknet is not connected with real systems, in most cases, the incoming packets on the darknet (‘the darknet traffic’) do not contain a payload. This means that we are unable to get real malware from the darknet traffic. This situation makes it difficult for security experts (e.g., academic researchers, engineers, operators, etc.) to identify whether the source hosts of the darknet traffic are infected by real malware or not. In this paper, we present the overall procedure of the in-depth analysis between the darknet traffic and IDS alerts using real data collected at the Science and Technology Cyber Security Center (S&T CSC) in Korea and provide the detailed in-depth analysis results. The ultimate goal of this paper is to provide practical experience, insight and know-how to security experts so that they are able to identify and trace the root cause of the darknet traffic. The experimental results show that correlation analysis between the darknet traffic and IDS alerts is very useful to discover potential attack hosts, especially internal hosts, and to find out what kinds of malware infected them

    キョウシ ナシ キカイ ガクシュウ ニ モトズク ネットワークガタ シンニュウ ケンチ システム ノ コウセイノウカ ニ カンスル ケンキュウ

    No full text
    京都大学0048新制・課程博士博士(情報学)甲第14763号情博第338号新制||情||64(附属図書館)UT51-2009-D475京都大学大学院情報学研究科知能情報学専攻(主査)教授 岡部 寿男, 教授 山本 章博, 教授 金澤 正憲学位規則第4条第1項該当Doctor of InformaticsKyoto UniversityDA

    An Advanced Security Event Visualization Method for Identifying Real Cyber Attacks

    No full text
    Most organizations deploy and operate intrusion detection system (IDS) on their networks in order to defend their vital computer and network resources from malicious cyber attackers. Although IDS has been contributed to the improvement of network security, there is a fatal problem in that it records the tremendous amount of alerts, so that security operators are unable to deal with all of them and it is inevitable to miss real cyber attacks from the recorded IDS alerts. Many visualization methods of IDS alerts have been proposed in order to cope with this issue, but their main objective is to better understand only overall attack situations, not to detect real cyber attacks. In this paper, we propose an advanced visualization method of IDS alerts based on machine learning and statistical features derived from IDS alerts. The proposed visualization method can be contributed to the reduction of IDS alerts that must be analyzed by security operators and to effectively identify real cyber attacks from IDS alerts

    An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment

    No full text
    As the Internet of Things (IoT) has developed, the emerging sensor network (ESN) that integrates emerging technologies, such as autonomous driving, cyber-physical systems, mobile nodes, and existing sensor networks has been in the limelight. Smart homes have been researched and developed by various companies and organizations. Emerging sensor networks have some issues of providing secure service according to a new environment, such as a smart home, and the problems of low power and low-computing capacity for the sensor that previous sensor networks were equipped with. This study classifies various sensors used in smart homes into three classes and contains the hierarchical topology for efficient communication. In addition, a scheme for establishing secure communication among sensors based on physical unclonable functions (PUFs) that cannot be physically cloned is suggested in regard to the sensor’s low performance. In addition, we analyzed this scheme by conducting security and performance evaluations proving to constitute secure channels while consuming fewer resources. We believe that our scheme can provide secure communication by using fewer resources in a smart home environment in the future

    Automated Verification Methodology of Security Events Based on Heuristic Analysis

    No full text
    We present an automated verification methodology of the security events, that is, IDS alerts, based on heuristic analysis. The proposed verification methodology aims to automatically identify real cyberattacks from the security events and filter out false positive, so that the security analyst is able to conduct security monitoring and response more effectively. For the proposed verification methodology, we used the 1,528,730,667 security events that were obtained from Science and Technology Security Center (S&T-SEC). We then extracted the core security events that were caused by the real cyberattacks. Among the core security events, we selected the top 20 types of the security events in the number of the real attacks that they raised. By analyzing the top 20 types of the security events, we discovered essential elements and optional elements for using in the automated verification of the security events. The evaluation results showed that the proposed verification methodology could contribute to the reduction (about 67%) of the meaningless security events. Furthermore, we demonstrated that the proposed verification methodology contributed to the detection of 140 true negatives that were not identified by the security analyst and the total accuracy of the proposed verification methodology was 96.1%

    High MET copy number and MET overexpression: Poor outcome in non-small cell lung cancer patients

    No full text
    The aim of this study was to evaluate the prevalence and prognostic role of increased gene copy number and protein expression of MET and EGFR in non-small cell lung cancer (NSCLC) patients. Samples were collected from 380 patients with surgically resected NSCLC, and fluorescence in situ hybridisation (FISH) and immunohistochemistry (IHC) were performed. EGFR amplification and high polysomy (EGFR FISH-positive) were observed in 9.7% and 17.4% of the patients, respectively. EGFR was overexpressed (EGFR IHC-positive) in 19.2% of the patients. Neither EGFR FISH-positive nor EGFR IHC-positive status affected survival after resection. Increased MET copy number (MET FISH-positive by University of Colorado Cancer Center criteria) was observed in 11.1% of the patients (high polysomy, 8.7%; gene amplification, 2.4%). According to the Cappuzzo system, 7.1% of the patients were MET FISH-positive. MET FISH positivity was a negative prognostic factor, especially in patients with adenocarcinoma histology (p=0.040), female gender (p=0.010), old age (p=0.084), and EGFR FISH negativity (p=0.020) at the univariate level but not at the multivariate level. MET was overexpressed (MET IHC-positive) in 13.7% of the patients and associated with shorter overall and disease-free survival (p=0.010 and p=0.056, respectively). Multivariate analysis revealed that MET IHC-positive patients had a significantly increased risk of death (hazard ratio, 1.618; 95% confidence interval, 1.066-2.456; p=0.024). Increased MET copy number and MET overexpression are negative prognostic factors for surgically resected NSCLC
    corecore